CN112612742B - Platform firmware elastic topology - Google Patents

Platform firmware elastic topology Download PDF

Info

Publication number
CN112612742B
CN112612742B CN202011586297.6A CN202011586297A CN112612742B CN 112612742 B CN112612742 B CN 112612742B CN 202011586297 A CN202011586297 A CN 202011586297A CN 112612742 B CN112612742 B CN 112612742B
Authority
CN
China
Prior art keywords
management controller
firmware
control center
platform
interface
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202011586297.6A
Other languages
Chinese (zh)
Other versions
CN112612742A (en
Inventor
崔亮
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Suzhou Inspur Intelligent Technology Co Ltd
Original Assignee
Suzhou Inspur Intelligent Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Suzhou Inspur Intelligent Technology Co Ltd filed Critical Suzhou Inspur Intelligent Technology Co Ltd
Priority to CN202011586297.6A priority Critical patent/CN112612742B/en
Publication of CN112612742A publication Critical patent/CN112612742A/en
Application granted granted Critical
Publication of CN112612742B publication Critical patent/CN112612742B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F13/00Interconnection of, or transfer of information or other signals between, memories, input/output devices or central processing units
    • G06F13/38Information transfer, e.g. on bus
    • G06F13/42Bus transfer protocol, e.g. handshake; Synchronisation
    • G06F13/4282Bus transfer protocol, e.g. handshake; Synchronisation on a serial bus, e.g. I2C bus, SPI bus

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Stored Programmes (AREA)

Abstract

The embodiment of the application provides a platform firmware elasticity topological device, belongs to the technical field of data safety, and has solved that the circuit is complicated after adopting platform firmware elasticity PFR among the current scheme, and the device overall arrangement on the PCB mainboard is walked the line and is become difficult, has brought very big difficulty in the design, increases the problem of design risk. The device comprises: the system comprises a field programmable gate array, a platform control center and a substrate management controller; the platform control center is connected with the substrate management controller through an ESPI bus and used for sending a reading instruction to the substrate management controller; the field programmable gate array is connected with the platform control center and the substrate management controller through an ESPI bus and used for acquiring a reading instruction sent by the platform control center to the substrate management controller.

Description

Platform firmware elastic topology
Technical Field
The embodiment of the application relates to the technical field of data security, in particular to a platform firmware elastic topology.
Background
With the development of the internet, but at the same time, network attacks on the internet become more and more, and the internet is more popular, and particularly in the cloud era of servers, people need to pay extra attention to data security of the servers and do security maintenance work of the cloud servers. The Intel proposed PFR techniques to ensure the security and reliability of the server against known or unknown attacks. The goal of intel PFR technology is to restore the firmware of a platform to a known good state by protecting platform assets, detecting corrupted firmware and malicious or erroneous behavior. In addition, with the continuous iterative development and promotion of Intel CPUs, the requirements of each generation of CPU platform on speed and performance are higher. In both the Intel pure platform and the Whitely platform, the LPC bus is used between the PCH and the BMC.
At present, in order to support TPM and BMC to update firmware on a server mainboard, the SPI circuit is difficult to be wired on a PCB, and the problem of SPI signal quality is possibly caused. The PFR technology of intel is increased at present, the complexity of an SPI circuit is increased, and higher requirements are put on the placement and wiring of PCB devices.
Disclosure of Invention
An object of the embodiment of the application is to provide a platform firmware elastic topology, which solves the problems that in the prior art, after platform firmware elastic PFR is adopted, the circuit is complex, the layout and routing of devices on a PCB main board become difficult, great difficulty is brought to design, and the design risk is increased.
The embodiment of the present application provides a platform firmware elastic topology, including:
the system comprises a field programmable gate array, a platform control center and a substrate management controller;
the platform control center is connected with the substrate management controller through an ESPI bus so that the platform control center sends a reading instruction to the substrate management controller;
the field programmable gate array is connected with the platform control center and the substrate management controller through an ESPI bus so as to enable the field programmable gate array to obtain the reading instruction sent to the substrate management controller by the platform control center.
Optionally, a general input/output interface of the field programmable gate array is defined.
Optionally, the step of defining the general-purpose input/output interface of the fpga includes:
defining the universal input/output interface connected with the reset interface of the platform control center as a Filtered SPI _ CS _ N interface;
defining the general input/output interface connected with the reset interface of the substrate management controller as an SPI _ CS _ N interface;
the interface connected with the data selector is defined as a MUX interface.
Optionally, the Filtered SPI _ CS _ N interface of the field programmable gate array is connected to the reset interface of the platform control center through the ESPI bus;
the SPI _ CS _ N interface of the field programmable gate array is connected with the reset interface of the substrate management controller through the ESPI bus.
Optionally, the connection between the fpga, the platform control center, and the bmc is a daisy chain topology connection.
Optionally, the firmware of the baseboard management controller includes a self firmware and a system firmware of the baseboard management controller.
Optionally, the self firmware and the system firmware of the bmc may be stored in the same spi register.
Optionally, the serial peripheral interface register is disposed on the platform control center and/or the baseboard management controller.
Optionally, the method further includes: a data selector;
the data selector is connected with the field programmable gate array through an SPI circuit and is used for acquiring MUX signals of the field programmable gate array;
the data selector is connected with the serial peripheral interface register through an SPI (serial peripheral interface) circuit and is used for acquiring the self firmware and the system firmware of the substrate management controller;
the data selector is connected with the platform control center and/or the baseboard management controller through an SPI circuit and used for acquiring instructions of the platform control center and/or the baseboard management controller.
Optionally, the data selector may switch the SPI path according to the MUX signal.
An embodiment of the present application provides a platform firmware resilient topology, including: the system comprises a field programmable gate array, a platform control center and a substrate management controller; the platform control center is connected with the substrate management controller through an ESPI bus so that the platform control center sends a reading instruction to the substrate management controller; the field programmable gate array is connected with the platform control center and the substrate management controller through an ESPI bus so as to enable the field programmable gate array to obtain the reading instruction sent to the substrate management controller by the platform control center. Pass through ESPI bus connection with above-mentioned field programmable gate array, above-mentioned platform control center and above-mentioned base plate management controller, adopt the SPI bus among the ESPI bus replacement prior art scheme, it is complicated to have solved among the prior art to adopt platform firmware elasticity PFR back circuit, and the difficulty that the line becomes is walked in the device overall arrangement on the PCB mainboard, has brought the difficulty in the design, increases the problem of design risk.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings needed to be used in the embodiments or the prior art descriptions will be briefly described below, and it is obvious that the drawings in the following description are some embodiments of the present application, and other drawings can be obtained by those skilled in the art without creative efforts.
FIG. 1 is a connection diagram of a platform firmware resiliency topology in some examples;
fig. 2 is a connection diagram of a platform firmware resilient topology according to an embodiment of the present disclosure;
FIG. 3 is a diagram illustrating an arrangement of a firmware storage area according to an embodiment of the present disclosure;
fig. 4 is a schematic diagram of another arrangement manner of a firmware storage area according to an embodiment of the present application.
Detailed Description
To make the objects, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions of the embodiments of the present application will be clearly and completely described below with reference to the accompanying drawings. All other embodiments obtained by a person of ordinary skill in the art based on the embodiments in the present application without making creative efforts belong to the protection scope of the embodiments in the present application.
The terms "comprising" and "having," and any variations thereof, as referred to in the embodiments of the present application, are intended to cover non-exclusive inclusions. For example, a process, apparatus, system, article, or apparatus that comprises a list of steps or elements is not limited to only those steps or elements but may include other steps or elements not expressly listed or inherent to such process, apparatus, system, article, or apparatus.
FIG. 1 is a schematic diagram of a SPI connection topology supporting a PFR and a TPM module; the PFR requires an FPGA on a mainboard to support a PFR code, the FPGA provides power through a power supply module PSU, and a current path is formed through VR pins; the FPGA is respectively connected with a system firmware FLASH and a BMC firmware FLASH to the FPGA, the BMC is connected with two SPI data selectors MUX through an SPI bus, an SPI monitoring signal SPI monitor is transmitted, the system firmware FLASH and the BMC firmware FLASH are respectively connected through the two SPI MUXs, the SPI MUX of the BMC connected with the system firmware FLASH is used as a first data selector, the PCH is connected with the system firmware FLASH, the PCH is connected with a second SPI MUX after being connected with the first SPI MUX, the first SPI MUX is connected with the system firmware, the SPI MUX of the BMC connected with the BMC firmware FLASH is used as a third data selector, the FPGA is connected with the third data selector and the second data selector through the SPI bus, the FPGA is connected with the BMC and the second SPI bus through the SPI bus, and transmits a Reset signal and other control signals to the BMC and the PCH; when the server is started, the FPGA controls the mux to switch the SPI to the self, integrity measurement is carried out on firmware of the BMC and the system respectively, and reset signals of the BMC and the PCH are released after the measurement is passed, so that the BMC and the PCH can load the firmware to start working. When the server runs, the FPGA monitors the reading and writing of the BMC and the PCH to the FLASH through the SPI monitor signal, thereby preventing malicious operation and damaging firmware. If so, the FPGA forces the backup stored in FLASH to be overlaid on the corrupted firmware.
An embodiment of the present application provides a platform firmware resilient topology, including: the system comprises a field programmable gate array, a platform control center and a substrate management controller;
the platform control center is connected with the substrate management controller through an ESPI bus so that the platform control center sends a reading instruction to the substrate management controller;
the field programmable gate array is connected with the platform control center and the substrate management controller through an ESPI bus so as to enable the field programmable gate array to obtain the reading instruction sent to the substrate management controller by the platform control center.
For example, as shown in fig. 2, the platform control center PCH and the BMC are connected through an ESPI bus, and when one end is the platform control center PCH and the other end is the BMC, the platform control center PCH sends a read command to the BMC; the FPGA is connected with the platform control center PCH and the baseboard management controller BMC through an ESPI bus, and transmits Reset signals and other control signals of oth control signals to the BMC and the PCH; the FPGA acquires the reading instruction sent by the platform control center PCH to the baseboard management controller BMC, the FPGA provides power through a power module PSU, and a current path is formed through a VR pin; (ii) a
The general input/output interface of the FPGA connected with the reset interface of the platform control center is a Filtered SPI _ CS _ N interface, the general input/output interface of the FPGA connected with the reset interface of the substrate management controller is an SPI _ CS _ N interface, the interface of the FPGA connected with the data selector is a MUX interface, and the interface of the FPGA connected with the SPI FLASH is a Filtered SPI _ CS _ N interface;
the PCH is connected to the BMC and the FPGA through an eSPI bus, and the firmware of the BMC and the system is stored in the SPI FALSH in a partitioning mode;
the output of above-mentioned data selector passes through SPI bus connection SPI FALSH and above-mentioned FPGA, and above-mentioned FPGA sends control signal to above-mentioned data selector.
The platform control center is connected with the substrate management controller through an ESPI bus so that the platform control center sends a reading instruction to the substrate management controller; the field programmable gate array is connected with the platform control center and the substrate management controller through an ESPI bus so as to enable the field programmable gate array to obtain the reading instruction sent to the substrate management controller by the platform control center. Pass through ESPI bus connection with above-mentioned field programmable gate array, above-mentioned platform control center and above-mentioned base plate management controller, adopt ESPI bus to replace the SPI bus among the prior art scheme, it is complicated to have solved among the prior art to adopt platform firmware elasticity PFR back circuit, and the device layout on the PCB mainboard walks the difficulty that becomes, has brought the difficulty in the design, increases the problem of design risk.
In one possible implementation, a general purpose input-output interface of the field programmable gate array is defined.
For example, a general input/output interface of the fpga is defined so that the BMC and the PCH can read and write system firmware implemented through the ESPI bus.
In a possible implementation manner, the step of defining a general-purpose input/output interface of the field programmable gate array includes:
defining the universal input/output interface connected with the reset interface of the platform control center as a Filtered SPI _ CS _ N interface;
defining the general input/output interface connected with the reset interface of the substrate management controller as an SPI _ CS _ N interface;
the interface connected with the data selector is defined as a MUX interface.
Optionally, the Filtered SPI _ CS _ N interface of the field programmable gate array is connected to the reset interface of the platform control center through the ESPI bus;
the SPI _ CS _ N interface of the field programmable gate array is connected with the reset interface of the substrate management controller through the ESPI bus.
Illustratively, by defining a specific interface, the FPGA may control the BMC and the PCH to read and write system firmware implemented through the ESPI bus.
In one possible embodiment, the connection between the fpga, the platform control center, and the bmc is a daisy chain topology connection.
Illustratively, the PCH connects the FPGA and the BMC via an ESPI bus in a daisy chain topology, with the BMC at the end, in the simplest way to add more computers to the network, or to serially connect each computer next, as in the petals of a chrysanthemum. If a message is directed to the computer going down the way, each system bounces up it down the sequence until it reaches the destination.
In one possible embodiment, the firmware of the baseboard management controller includes the self firmware and the system firmware of the baseboard management controller.
In one possible embodiment, the native firmware and the system firmware of the baseboard management controller can be stored in the same SPI register.
The self firmware and the system firmware of the substrate management controller can be stored in the same serial peripheral interface register, so that the use of MUX and SPI FLASH is reduced, the wiring is reduced, the complexity of SPI design is reduced, and the reliability of design is improved.
In a possible embodiment, as shown in fig. 3 and 4, the serial peripheral interface register is disposed on the platform control center and/or the baseboard management controller, wherein the serial peripheral interface register is an SPI FLASH.
Illustratively, when the serial peripheral interface register is set, the position can be selectively set, which is beneficial to solving the complexity of SPI design.
In one possible embodiment, the method further comprises: a data selector;
the data selector is connected with the field programmable gate array through an SPI circuit and is used for acquiring MUX signals of the field programmable gate array;
the data selector is connected with the serial peripheral interface register through an SPI (serial peripheral interface) circuit and is used for acquiring the self firmware and the system firmware of the substrate management controller;
the data selector is connected with the platform control center and/or the substrate management controller through an SPI (serial peripheral interface) circuit and used for acquiring instructions of the platform control center and/or the substrate management controller.
Illustratively, the PCH is connected to the FPGA and the BMC through an ESPI bus, and is in a daisy chain topology, and the BMC is at the terminal; GPIO interfaces defining FPGA include: SPI _ CS _ N, filtered SPI _ CS _ N, MUX control signals to reset and other control signals to BMC and PCH, respectively; the FPGA code supports ESPI decoding and monitoring, and judges whether the firmware of the FLASH can be maliciously damaged by the current eSPI instruction; the MUX controls a signal to switch an SPI (Serial peripheral interface) channel, the selection is to BMC/PCH or FPGA, when the situation that the eSIP bus has malicious operation on FLASH is monitored, the SPI is switched to the FPGA, and malicious reading and writing are prevented; if the firmware is damaged maliciously, the PFR technology can copy the backed-up firmware in the flash to a firmware storage area. An eSPI-based PFR topology is implemented.
In one possible embodiment, the data selector can switch the SPI path according to the MUX signal.
ESPI monitoring between BMC and PCH is added, so that whether malicious operation on flash occurs or not can be judged in time; the use of MUX and SPI FLASH is reduced; the complexity of SPI design is reduced, and the reliability of design is improved.
It should be noted that: like reference numbers and letters refer to like items in the following figures, and thus once an item is defined in one figure, it need not be further defined and explained in subsequent figures, and moreover, the terms "first", "second", "third", etc. are used merely to distinguish one description from another and are not to be construed as indicating or implying relative importance.
Finally, it should be noted that: the above embodiments are merely specific implementations of the embodiments of the present application, and are not intended to limit the technical solutions of the embodiments of the present application, and the scope of the embodiments of the present application is not limited thereto, and although the embodiments of the present application are described in detail with reference to the foregoing embodiments, it should be understood by those skilled in the art that: those skilled in the art can still make modifications or changes to the technical solutions described in the foregoing embodiments, or make equivalent substitutions for some technical features, within the technical scope of the embodiments disclosed in the present application; such modifications, changes or substitutions do not depart from the spirit and scope of the embodiments of the present application. Are intended to be covered by the scope of the embodiments of the present application. Therefore, the protection scope of the embodiments of the present application shall be subject to the protection scope of the claims.

Claims (10)

1. A platform firmware resiliency topology, comprising:
the system comprises a field programmable gate array, a platform control center, a substrate management controller and a data selector;
the platform control center is connected with the substrate management controller through an ESPI bus so as to enable the platform control center to send a reading instruction to the substrate management controller;
the field programmable gate array is connected with the platform control center and the substrate management controller through an ESPI bus so as to enable the field programmable gate array to obtain the reading instruction sent to the substrate management controller by the platform control center;
the data selector is connected with the platform control center and/or the substrate management controller through an SPI (serial peripheral interface) line and is used for acquiring instructions of the platform control center and/or the substrate management controller.
2. The platform firmware resilient topology of claim 1, wherein a general purpose input-output interface of the field programmable gate array is defined.
3. The platform firmware resilient topology of claim 2, wherein the step of defining a generic input output interface of the field programmable gate array comprises:
defining the universal input/output interface connected with the reset interface of the platform control center as a Filtered SPI _ CS _ N interface;
defining the universal input/output interface connected with the reset interface of the baseboard management controller as an SPI _ CS _ N interface;
the interface connected with the data selector is defined as a MUX interface.
4. The platform firmware resiliency topology of claim 3,
the Filtered SPI _ CS _ N interface of the field programmable gate array is connected with the reset interface of the platform control center through the ESPI bus;
and the SPI _ CS _ N interface of the field programmable gate array is connected with the reset interface of the substrate management controller through the ESPI bus.
5. The platform firmware resilient topology of claim 1, wherein the field programmable gate array, the platform control center, and the baseboard management controller are connected in a daisy chain topology.
6. The platform firmware resiliency topology of claim 1, wherein the firmware of the baseboard management controller comprises a system firmware and a self firmware of the baseboard management controller.
7. The platform firmware resilient topology of claim 4, wherein the baseboard management controller's own firmware and system firmware can be stored in the same serial peripheral interface register.
8. The platform firmware resilient topology of claim 7, wherein the serial peripheral interface register is disposed on the platform control center and/or the baseboard management controller.
9. The platform firmware resilient topology of claim 7, further comprising: the data selector is connected with the field programmable gate array through an SPI (serial peripheral interface) line and is used for acquiring MUX (multiplexer) signals of the field programmable gate array;
the data selector is connected with the serial peripheral interface register through an SPI (serial peripheral interface) circuit and is used for acquiring the self firmware and the system firmware of the baseboard management controller.
10. The platform firmware resilient topology of claim 1, wherein the data selector is capable of switching SPI paths according to the MUX signal.
CN202011586297.6A 2020-12-29 2020-12-29 Platform firmware elastic topology Active CN112612742B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011586297.6A CN112612742B (en) 2020-12-29 2020-12-29 Platform firmware elastic topology

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011586297.6A CN112612742B (en) 2020-12-29 2020-12-29 Platform firmware elastic topology

Publications (2)

Publication Number Publication Date
CN112612742A CN112612742A (en) 2021-04-06
CN112612742B true CN112612742B (en) 2022-12-27

Family

ID=75248673

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011586297.6A Active CN112612742B (en) 2020-12-29 2020-12-29 Platform firmware elastic topology

Country Status (1)

Country Link
CN (1) CN112612742B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113204804B (en) * 2021-04-25 2022-03-22 山东英信计算机技术有限公司 Security module, server mainboard and server
CN113448401B (en) * 2021-05-28 2023-03-17 山东英信计算机技术有限公司 Mainboard and server

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108874700B (en) * 2018-06-01 2021-07-16 联想(北京)有限公司 Electronic device
CN111966626B (en) * 2020-07-29 2023-01-06 苏州浪潮智能科技有限公司 Server starting device and method based on ESPI bus

Also Published As

Publication number Publication date
CN112612742A (en) 2021-04-06

Similar Documents

Publication Publication Date Title
CN101126995B (en) Method and apparatus for processing serious hardware error
CN105204965B (en) Method and apparatus for the dynamic node reparation in multi-node environment
TWI446161B (en) Apparatus and method for handling a failed processor of a multiprocessor information handling system
CN112612742B (en) Platform firmware elastic topology
US6910160B2 (en) System, method, and computer program product for preserving trace data after partition crash in logically partitioned systems
JP2017224272A (en) Hardware failure recovery system
CN111324192A (en) System board power supply detection method, device, equipment and storage medium
US20200133759A1 (en) System and method for managing, resetting and diagnosing failures of a device management bus
CN112286709B (en) Diagnosis method, diagnosis device and diagnosis equipment for server hardware faults
WO2018095107A1 (en) Bios program abnormal processing method and apparatus
CN111414268A (en) Fault processing method and device and server
CN111949457A (en) Server fault chip detection method and device
CN114816820A (en) Method, device, equipment and storage medium for repairing chproxy cluster fault
CN112181468A (en) CPLD updating method, server and computer readable storage medium
CN112199240A (en) Method for switching nodes during node failure and related equipment
US11640377B2 (en) Event-based generation of context-aware telemetry reports
CN212541329U (en) Dual-redundancy computer equipment based on domestic Loongson platform
CN115599617B (en) Bus detection method and device, server and electronic equipment
WO2008004330A1 (en) Multiple processor system
CN111078454A (en) Cloud platform configuration recovery method and device
CN114996069A (en) Mainboard test method, device and medium
CN114884836A (en) High-availability method, device and medium for virtual machine
JP2013200616A (en) Information processor and restoration circuit of information processor
US10997012B2 (en) Identifying defective field-replaceable units that include multi-page, non-volatile memory devices
US11922175B2 (en) Unplanned reboot expedited recovery for network devices

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant